### [CVE-2018-20236](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20236) ![](https://img.shields.io/static/v1?label=Product&message=Sourcetree%20for%20Windows&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%200.5a%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Command%20Injection&color=brighgreen) ### Description There was an command injection vulnerability in Sourcetree for Windows from version 0.5a before version 3.0.10 via URI handling. A remote attacker could send a malicious URI to a victim using Sourcetree for Windows to exploit this issue to gain code execution on the system. ### POC #### Reference - http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html #### Github - https://github.com/ARPSyndicate/cvemon